Close
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Menu
Search
  • Latest News
  • Cybersecurity
  • Big Data and Analytics
  • Cloud
  • Mobile
  • Networking
  • Storage
  • Applications
  • IT Management
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Small Business

    Businesses Worried About BYOD Security Risks

    By
    Nathan Eddy
    -
    March 31, 2016
    Share
    Facebook
    Twitter
    Linkedin
      byod and mobile security

      Data leakage and loss reign as the top bring your own device (BYOD) security concerns, according to a survey of more than 800 global cyber security professionals.

      The survey, conducted by Crowd Research Partners in conjunction with data security vendors Bitglass, Blancco Technology Group, Check Point Technologies, Skycure, SnoopWall and Tenable Network Security, found that 56 percent of companies are worried about unauthorized access to company data and systems.

      Security (39 percent) and employee privacy (12 percent) are the biggest inhibitors of BYOD adoption. In contrast, management opposition (3 percent) and user experience concerns (4 percent) rank far lower.

      “With the explosion of data across multiple devices and remote access to systems, organizations are just now realizing how exposed their data is to security breaches,” Pat Clawson, CEO of Blancco Technology Group, told eWEEK. “It’s now critical and urgent for organizations to understand data lifecycle management and the processes and systems required at each stage – from creation of data to when it reaches end-of-life–before it becomes unmanageable.”

      Clawson explained this mistake isn’t specific to just one type of business–it happens to all kinds of businesses, regardless of their size, category or customer base.

      Survey results indicated security threats to BYOD impose heavy burdens on organizations’ IT resources (35 percent) and help desk workloads (27 percent).

      “With the infamous Ashley Madison breach, users who wanted to make sure all of their data was erased from the dating site put all of their trust into the site’s $20 full delete program,” he said. “Even though the obvious pointers to the data had been removed, the actual data hadn’t been permanently removed, which left significant amounts and types of information exposed. What ensued was negative publicity and backlash from the media, customers and the industry at large.”

      Clawson said the big lesson for businesses in 2016 will be to test and verify that deletion methods are adequate (data cannot be recovered) and to not blindly trust that simply deleting data will truly get rid of it for good.

      “Companies should provide clear information on key situations where mobile data erasure is absolutely necessary–at equipment end of life, when equipment is serviced, when loaner devices are returned and when equipment is re-purposed,” he said.

      Despite increasing mobile security threats, data breaches and new regulations, only 30 percent of organizations are increasing security budgets for BYOD in the next 12 months. Meanwhile, 37 percent have no plans to change their security budgets.

      Avatar
      Nathan Eddy
      A graduate of Northwestern University's Medill School of Journalism, Nathan was perviously the editor of gaming industry newsletter FierceGameBiz and has written for various consumer and tech publications including Popular Mechanics, Popular Science, CRN, and The Times of London. Currently based in Berlin, he released his first documentary film, The Absent Column, in 2013.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cloud

      Why Data Security Will Face Even Harsher...

      Chris Preimesberger - December 1, 2020 0
      Who would know more about details of the hacking process than an actual former career hacker? And who wants to understand all they can...
      Read more
      Cybersecurity

      How Veritas Is Shining a Light Into...

      eWEEK EDITORS - September 25, 2020 0
      Protecting data has always been one of the most important tasks in all of IT, yet as more companies become data companies at the...
      Read more
      Big Data and Analytics

      How NVIDIA A100 Station Brings Data Center...

      Zeus Kerravala - November 18, 2020 0
      There’s little debate that graphics processor unit manufacturer NVIDIA is the de facto standard when it comes to providing silicon to power machine learning...
      Read more
      Apple

      Why iPhone 12 Pro Makes Sense for...

      Wayne Rash - November 26, 2020 0
      If you’ve been watching the Apple commercials for the past three weeks, you already know what the company thinks will happen if you buy...
      Read more
      eWeek


      Contact Us | About | Sitemap

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Property of TechnologyAdvice.
      Terms of Service | Privacy Notice | Advertise | California - Do Not Sell My Information

      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×